Business Administration Education Guide

Friday, September 14, 2007


The new emerging health trend (which means new jobs)

I cannot remember how many doctor appointments I have missed because I just couldn’t leave the office at the specific time for a doctor's office visit. However with the new company MinuteClinic, a visitor can be seen by a physician's assistant or a nurse practitioner in appx 15 minutes. MinuteClinic is one of the largest chains of walk-in medical centers cropping up in pharmacies or stores such as Target or Wal-Mart. However, the clinics are only for basic ailments like earaches, seasonal allergies, common colds and pinkeye.

As new MinuteClinics open in new states, new career opportunities are becoming available. Their innovative approach to healthcare allows clients with simple healthcare problems be seen in one to two office visits while opening more opportunities for nurse practitioners and physician assistants. MinuteClinics offer both part-time and full-time positions with benefits. Office hours are reasonable which means a nurse practitioners or physician assistant could continue their education if desired.

Check out MinuteClinic for yourself

Labels: , , , ,

Thursday, September 13, 2007

The Danger Of Fake Jobs & Fake Job Recruiters

Job seekers are interviewing with online recruiters that pressure job candidates into giving sensitive and confidential information. Using fake job postings and targeting specific individuals for fake job interviews have become a tool for spying and identity theft.

Scenario One:

The target is lured by the position, salary, benefits or other enticements and in the interviewing process becomes comfortable and becomes less guarded about the details of the work they are doing at their current company.

Answering seemingly harmless questions about plans, programs, environment practices, people, marketing strategies or even technologies can lead to derivative intelligence. Derivative Intelligence is the gathering of mole intelligence from unknowing victims who voluntarily give pieces of information that can do an individual or a company financial harm. Using this technique, work projects, timelines and events that may be disclosed during a job interview could destroy competitive advantage for a corporation.

According to News Release Wire a un-named recruiter said this tactic has been and still is used in Silicon Valley where the competitive environment is extremely intense among technology companies.

Scenario Two:

By creating phony job ads, identity theft scammers hope to fool job hunters into sending them personal information (called phishing) such as filling out an online application that asks for social security numbers and or state identity numbers. Phony job ads often use familiar-looking or convincing company logos fakes and marketing slogans and provide links to fake web sites that appear to be those of genuine corporation. Many legitimate corporations may ask for this information but make sure you thoroughly research the company prior to providing this information. One red flag include charging a fees for services they never intend to make good on. Typically, after a few days the thieves close down the scam and disappear.

On the other hand, many scammers will go in hunt for personal web pages and resumes on public job sites. Once they find what they believe to be an easy target, the con artist will send an email pretending to be a job recruiter. The email will announce that the receiver is an excellent prospective candidate for the XYZ company and that the receiver should reply with a resume and or personal information right away to schedule an interview.

The scam is continued into a phone interview where they will than try to gain their victim's confidence to get personal information. With information such as a name, birthday, city of birth and city of residence a scam artist can locate the remaining needed information to steal an identity. A lot of this information is not required before an in-person interview or even until you have been offered a job with a company.

Tips For Online Job Hunters

1) Never provide any non-work related personal information such as your social security number, credit card number, date of birth or home address, through e-mail, and now it’s often suggested not to include it on your resume.

  • No job needs your credit card number
  • It’s illegal for employers to ask how old you are
  • They may want a job candidate who lives near the job site so do indeed list the city and state you live in. The home address and social security number isn’t needed until you are officially hired.

2) List your resume on a job site that allows only verified recruiters to scan them and uses a privacy policy. Use the first suggestion as a guideline.

3) Verify a prospective employer, recruiter, and or recruiting agency through another source such as the Better Business Bureau or even your local phone book. Try to contact them by phone and visit them in person if it’s a local company.

4) If a prospective recruiter or employer requests a background check, agree to do so only after you have met with them at their company location during regular work hours.

5) You should never have to pay for "exclusive" job leads or for a job itself. Beware of anyone who asks you for money in exchange for finding work for you. There are social networking groups that specialize in specific industries but members are paying for a membership with a basket of benefits such as job leads.

6) If you are paying for job placement services, use a prepaid credit card such as Green Dot. If you do use your regularly used credit card or bank direct payment program don’t start any financial trading until you have been to the place of business in person and have researched the prospective recruiter or job agency.

7) Does the e-mail address feature the company's name? As in JohDoe @ Is the address or locations inconsistent with the area or zip code?

8) Instead of using links from the ad or email, check out a web address by highlighting, copying and pasting the url with www in front (www .

9) Create an exclusive web-based e-mail address and account for job hunting only.

10) Trust your instincts

Always remember: If it sounds too good to be true it usually is.

Labels: , , , ,

Wednesday, September 12, 2007

Why some computer technology is blocked at work

SOURCE: CIO - The Eight Most Dangerous Consumer Technologies

Instant Messaging

In one study, 40 percent of study respondents said they use consumer a instant messenger service such as AOL or Yahoo at work. Consumer instant messaging presents numerous security challenges. One such challenge is that malware can enter a corporate network through external IM software. Every time IM users send sensitive company data across insecure networks, the company is at risk of vicious attacks.

Web Mail
Nine out of ten people I know use services such as Hotmail, Yahoo or Gmail for both personal and professional email services. The problem with consumer e-mail services is that we the users don't realize how insecure our own e-mail exchanges are because messages are transported over the Web, stored on the ISP's server and temporarily stored on the e-mail provider's server. Even though I know this in the back of my head, even I don’t always consider the value of sending sensitive information such as Social Security numbers, passwords and or confidential business information through email.

Portable Storage Devices
Have you ever lost or have you ever had a purse, wallet or jacket stolen? An IT manager’s and executives biggest fear is the shrinking physical size of portable storage. It’s anther thing a lot of people do. Too tired to stay at work, you decide you’ll take home some of the files to work on after dinner. With portable drives so convenient it’s incredibly easy to transfer some copies and slip into your purse or pocket. The problem is what can be pocketed can be stolen.
PDAs and Smartphones
Not all computers, software and gadgets speak the same language. People are using smartphone and PDA for everything. But When a employee with a smartphone or PDA (BlackBerry, Treo or an iPhone) try to sync up their device's calendar or e-mail application with their own PC, it can cause problems ranging from application glitches to the blue screen of death.

Why? Because if you go to Korea expecting to communicate easily with the locals but you don’t speak Korean, you’re going to have this blank look on your face when they talk to you in Korean. Some computers, software and gadgets act the same way. If they don’t speak the same language they will malfunction.

Camera Phones
Not just instant happy moments, unless you’re a thief. A undercover ‘mystery shopper’ (for lack of a better word) from DeKalb's Finney went to a hospital, stood at the hospital station and took pictures with her camera phone without the nurses knowing it. She than downloaded and enhance the images to see if she could get any patient information from them. The nurses were good about security she didn’t get any. With an advanced digital camera phone or small digital camera, any thief can easily randomly snap pictures of secure documents.

Anther trail of thought - It’s someone birthday at work and the office surprises the person with a cake at their desk … as she / he is working on highly confidential company information. Someone than posts a picture of the happy surprise moment and unbeknownst to the picture taker, she / he is also showing the screen full of confidential company information.

Downloadable Widgets
The risk is that these programs use processing power on the computer and the network. Any software that is downloaded without being determined ‘not a threat’ is a potential threat of viruses and vicious attacks.

Virtual Worlds
Using virtual worlds such as Second Life involves downloading large programs in order to run the virtual world which is than stored inside the corporate firewall. There's really no way to know the genuine identities of the avatars behind the online name in virtual worlds. You could be talking to a just anther employee of a company that has a few minutes to kill… Or you could be talking to a competitor trying to manipulate confidential company information. Even telling someone that your company will be at the XYZ tradeshow could potential hurt sales for your company.

What America's Top Ten Jobs Pay


Physician assistants -- Unlike medical assistants, who perform routine clinical and clerical tasks, physician assistants practice medicine under the supervision of physicians and surgeons.

Job Growth (through 2014): 49.6 percent

2. Computer applications software engineers, applications -- These professionals analyze users' needs and design, construct and maintain general computer applications software or specialized utility programs.
Growth: 49.4 percent

3. Dental hygienists -- Dental hygienists examine patients' teeth and gums to detect diseases and abnormalities, teach patients how to practice good oral hygiene and provide other preventive dental care.

Growth: 43.3 percent

4. Computer systems software engineers -- They coordinate the construction and maintenance of a company's computer systems and plan their future growth.

Growth: 43 percent

5. Network and computer systems administrators -- They design, install and support an organization's local-area network (LAN), wide-area network (WAN), network segment, Internet or intranet system.

Growth: 38.4 percent

6. Database administrators -- Database administrators work with database management systems software and determine ways to organize and store data. They identify user requirements, set up computer databases, and test and coordinate modifications to the computer database systems.

Growth: 38.2 percent

7. Physical therapists -- Physical therapists provide services that help restore function, improve mobility, relieve pain and prevent or limit permanent physical disabilities of patients suffering from injuries or disease. They restore, maintain and promote overall fitness and health.

Growth: 36.7 percent

8. Diagnostic medical sonographers -- Sonographers operate the sonograph equipment, which collects reflected echoes and forms an image that may be videotaped, transmitted or photographed for interpretation and diagnosis by a physician.

Growth: 34.8 percent

9. Occupational therapists -- Occupational therapists help individuals who have conditions that are mentally, physically, developmentally or emotionally disabling perform a range of activities, from using a computer to dressing, cooking and eating.

Growth: 33.6 percent

10. Environmental engineers -- These engineers apply the principles of biology and chemistry to develop solutions to environmental problems, assisting with pollution control, recycling, waste disposal and public health issues.

Growth: 30 percent

Tuesday, September 11, 2007

Firefox Keyboard Shortcuts

CTRL + T: Opens a new tab.

CTRL + R: Reloads the current tab.

CTRL + H: View your browsing history in a sidebar

CTRL + J: Opens your Firefox download manager

CTRL + TAB: Moves to the next tab.

CTRL + SHIFT + TAB: Moves to the previous tab.

CTRL + Z: Undo last action

CTRL + SHIFT + Z: Redo last action

CTRL + ENTER: Auto-complete URL to .com

CTRL + SHIFT + ENTER: Auto-complete URL to .org

CTRL + SHIFT + T: Restore the last closed tab

CTRL + number: Change to the tab with this number

CTRL + F4: Close the current tab

CTRL + N: Opens a new Firefox window

CTRL + S: Download the current webpage page as a HTML file

CTRL + L: Highlights the URL in the browser address bar

CTRL + HYPHEN: Decrease text size on the webpage

CTRL + PLUS: Increase text size on the webpage

CTRL + D: Add webpage to bookmarks

ALT + Home: Loads your start page.

ALT + F4: Close the browser window

SHIFT + ENTER: Auto-complete URL to .net

F5: Reload the current tab

F11: Go full screen / normal screen

Space: Scroll down the page

ESC: Stop

Labels: , , , ,